Computer Science

51522 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Steganography from weak cryptography
By Boris Skoric · ArXiv: 0804.0659
2008-04-07
0
Source Coding with Mismatched Distortion Measures
By Urs Niesen, Devavrat Shah, Gregory Wornell · ArXiv: 0804.0635
2008-04-07
0
Channel State Feedback Schemes for Multiuser MIMO-OFDM Downlink
By Hooman Shirani-Mehr, Giuseppe Caire · ArXiv: 0804.0611
2008-04-04
0
Symmetry Breaking for Maximum Satisfiability
By Joao Marques-Silva, Ines Lynce, Vasco Manquinho · ArXiv: 0804.0599
2008-12-18
0
Decentralized Search with Random Costs
By Oskar S, berg · ArXiv: 0804.0577
2008-04-04
0
An Artificial Immune System as a Recommender System for Web Sites
By Tom Morrison, Uwe Aickelin · ArXiv: 0804.0573
2010-07-05
0
A Parameterized Perspective on $P_2$-Packings
By Jianer Chen, Henning Fernau, Dan Ning · ArXiv: 0804.0570
2008-12-18
0
Agent-Based Perception of an Environment in an Emergency Situation
By Fahem Kebair (LITIS), Frederic Serin (LITIS), Cyrille Bertelle (LITIS) · ArXiv: 0804.0558
2008-12-18
0
Irregular turbo code design for the binary erasure channel
By ** Ghassan M. Kraidy, Valentin Savin ** · ArXiv: 0804.0539
2008-04-04
0
Application of Rough Set Theory to Analysis of Hydrocyclone Operation
By H.Owladeghaffari, M.Ejtemaei, M.Irannajad · ArXiv: 0804.0528
2008-04-04
0
Nonparametric Statistical Inference for Ergodic Processes
By Daniil Ryabko (INRIA Lille - Nord Europe), Boris Ryabko (SIBSUTI, ICT SBRAS) · ArXiv: 0804.0510
2012-04-05
0
Distributed Consensus over Wireless Sensor Networks Affected by Multipath Fading
By Gesualdo Scutari, Sergio Barbarossa · ArXiv: 0804.0506
2009-11-13
0
Joint Beamforming for Multiaccess MIMO Systems with Finite Rate Feedback
By Wei Dai, Brian C. Rider, Youjian Liu · ArXiv: 0804.0441
2008-12-18
1
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes
By Ayoub Otmani, Jean-Pierre Tillich, Leonard Dallot · ArXiv: 0804.0409
2010-01-04
0
On the Sum-Capacity of Degraded Gaussian Multiaccess Relay Channels
By Lalitha Sankar, Narayan B. M, ayam · ArXiv: 0804.0385
2008-04-03
0
Exhaustive enumeration unveils clustering and freezing in random 3-SAT
By John Ardelius, Lenka Zdeborova · ArXiv: 0804.0362
2008-10-02
0
Graphical Estimation of Permeability Using RST&NFIS
By H.Owladeghaffari, K.Shahriar W. Pedrycz · ArXiv: 0804.0353
2008-04-03
0
Permeability Analysis based on information granulation theory
By M.Sharifzadeh, H.Owladeghaffari, K.Shahriar · ArXiv: 0804.0352
2008-04-03
0
On the Convexity of the MSE Region of Single-Antenna Users
By Raphael Hunger, Michael Joham · ArXiv: 0804.0337
2008-07-29
0
Mapping Semantic Networks to Undirected Networks
By Marko A. Rodriguez · ArXiv: 0804.0277
2008-12-02
0
A proof theoretic analysis of intruder theories
By Alwen Tiu, Rajeev Gore · ArXiv: 0804.0273
2009-04-06
2
Support Vector Machine Classification with Indefinite Kernels
By Ronny Luss, Alex, re dAspremont · ArXiv: 0804.0188
2009-08-04
0
From Random Graph to Small World by Wandering
By Bruno Gaume (IRIT), Fabien Mathieu (FT R&D, INRIA Rocquencourt) · ArXiv: 0804.0149
2008-12-18
0
Private Handshakes
By Jaap-Henk Hoepman · ArXiv: 0804.0074
2008-04-02
0
Binary Decision Diagrams for Affine Approximation
By Kevin Henshall, Peter Schachte, Harald S{o}ndergaard · ArXiv: 0804.0066
2016-08-14
0
Outage Probability of the Gaussian MIMO Free-Space Optical Channel with PPM
By Nick Letzepis, Albert Guillen i Fabregas · ArXiv: 0804.0050
2008-04-02
0
On the reconstruction of block-sparse signals with an optimal number of measurements
By Mihailo Stojnic, Farzad Parvaresh, Babak Hassibi · ArXiv: 0804.0041
2011-03-09
0
Complexity and algorithms for computing Voronoi cells of lattices
By Mathieu Dutour Sikiric, Achill Schuermann, Frank Vallentin · ArXiv: 0804.0036
2009-05-04
0
A Dual Polynomial for OR
By Robert Spalek (Google) · ArXiv: 0803.4516
2008-04-01
0
Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives
By Laszlo B. Kish, Olivier Saidi · ArXiv: 0803.4479
2011-08-16
1
«« « 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 » »»